Intel

AIKIDO-2026-10738

n8n-mcp is vulnerable to Server-Side Request Forgery (SSRF)

Server-Side Request Forgery (SSRF)GHSA-cmrh-wvq6-wm9r

71

High Risk

This Affects:

JSn8n-mcp
2.18.7 - 2.50.1
Fixed in 2.50.2
Are you affected? Scan for Free

TL;DR

n8n-mcp exposes webhook and API client flows that fetch attacker-influenced URLs behind SSRF checks. The prior validation could resolve a hostname once while the actual outbound HTTP connection could land on a different address later, which matches a DNS rebinding time-of-check/time-of-use gap. Redirect following widened how far a single allowed URL could pivot before pinning. The patch carries forward resolved address metadata and pins connections to the validated IP while stopping redirects so the transport matches the decision that passed SSRF policy.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

n8n-mcp is vulnerable to Server-Side Request Forgery (SSRF) in versions 2.18.7 - 2.50.1.

How to fix this

Upgrade the n8n-mcp library to the patch version.